Enhance Your Agency's Human Capital Str...
If you are eager to explore the next stage of enhancing employee experiences and facilitate agility, this is the webinar for you! Attendees joined us for an in-depth discussion on the transformative power and impacts of AI in the digital workplace and saw how they can use the power of GenAI to further enhance their employee experiences.
Leveraging Splunk SOAR to Increase Prod...
This webinar helped familiarize participants with how to respond to incidents, manage cases and artifacts, automate their incident response, and standard operating procedures. Participants walked through a real-world scenario and see first-hand how Splunk SOAR can be used to create a notable event to enrich alerts by automatically gathering data, all the way to managing and resolving the incident. During this webinar, they:Gained a better unde...
Bridging the Gap: Secure & Intuitive Cr...
This webinar focused on the Kiteworks-plus-Everfox solution, which provides:Secure, high-speed content transfers across multiple domainsPolicy-driven security, compliance controls, and comprehensive end-to-end audit loggingInline and dirty word filtering, byte-level deep content inspection, one-way data diodes, and data validationA user-friendly web file-sharing interface with rigorous access controls and flexible authentication options, such...
How USDA DISC is Driving Digital Transf...
The Digital Infrastructure Services Center (DISC) is the backbone of the USDA’s digital landscape, ensuring mission-critical infrastructure is reliable, secure, and optimized for peak application performance. In this webinar, attendees learned how DISC uses Datadog to ensure seamless operations and maximize IT uptime including the importance of proactive monitoring, and the direct impact on the USDA’s mission. Speakers shared real-...
Enrollment and Donor Forecasting for Hi...
We hosted a webinar with Avaap's data and analytics leaders to explore how Avaap used Alteryx to build a comprehensive longitudinal data system. This system provided a single, comprehensive view by consolidating various sources of student data into a central repository, enabling education leaders to identify at-risk students, enhance student success, increase revenue, and more. During the webinar, attendees:Studied the benefits of a longitudin...
AI for the Rest of Government Part Thre...
This webinar addressed concerns about adopting AI in government agencies, and explored how agencies can gain confidence and utilize AI.Attendees learned about:How to intelligently search for information across many locations and types.How to safely use Gen AI on business content to power smarter and faster decisions.Elevate productivity by leveraging smart content.
ISV Bay Day Summit
Amazon Web Services (AWS), Feenix.ai, Second Front Systems, Exostellar, and Carahsoft partnered together for the first-ever ISV Bay Day Summit on November 12!Sessions included:AWS Marketplace Listing WorkshopAWS Accelerated Partner DevelopmentAWS ISV Offered ProgramsCompliance PanelTechnology Specific Vertical Breakout Sessions
Improve Network Traffic Visibility: Uti...
In today's complex public sector environments, ensuring network security and compliance is paramount. Application Metadata Insight (AMI) offer a powerful solution to address these challenges. Cribl provides a flexible data management solution, while Gigamon's AMI delivers deep application-level visibility. By integrating these technologies, public sector organizations can:Improve security: Gain granular insights into network traffic, identify...
Maximizing Efficiency: Strategies for E...
This webinar was designed for Tableau Site administrators seeking to optimize their platform's performance and streamline operations for all users. From efficient resource management to user access control and performance tuning, we will cover a range of topics to empower you in maintaining a roubust and responsive Tableau environment. During this webinar, attendees:Dove into Tableau strategiesLearned best practices for Tableau online deployme...
FIPS 140-3 is (Finally) Here
FIPS 140-3, titled Security Requirements for Cryptographic Modules, is the third update to the FIPS 140 benchmark established by NIST to specify the security requirements for cryptographic modules and a testing methodology for confirming conformance. Companies selling technology with encryption to the public sector often must obtain FIPS 140 certification that their cryptography has been tested and approved for government use. In addition, oth...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.